Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
DADA/Articles/st42_Overview.md
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
25 lines (17 sloc)
922 Bytes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Summary of Course | |
Over the past weeks we have looked at an introduction to cyber | |
security, what are the issue that can effect us, and what can we do to | |
stay safe? | |
We have looked at what security is the top threats to people and | |
organisations, and what this means for you. | |
We also examined our online data presence, looking at how social | |
engineering can be used to get information about people. This | |
information could be used to attack an organisation, or to defraud | |
individuals. We learnt that restricting the information you have | |
online is the best defence here. | |
We also examined some technical aspects of Hacking. How passwords | |
work, and what this means for our security. Then did some actual | |
hacking based on two common web vulnerabilities. | |
Finally we looked at who the hackers are, the legal implications of | |
hacking, and how countries can protect themselves. | |
Thanks for taking part, hope you enjoyed it. |